Xftp FTP Client version up to and including 3.0 (build 0238) contain a stack-based buffer overflow vulnerability triggered by a maliciously crafted PWD response from an FTP server. When the client connects to a server and receives an overly long directory string in response to the PWD command, the client fails to properly validate the length of the input before copying it into a fixed-size buffer. This results in memory corruption and allows remote attackers to execute arbitrary code on the client system.
History

Tue, 26 Aug 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Netsarang
Netsarang xftp
Vendors & Products Netsarang
Netsarang xftp

Thu, 21 Aug 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 21 Aug 2025 20:30:00 +0000

Type Values Removed Values Added
Description Xftp FTP Client version up to and including 3.0 (build 0238) contain a stack-based buffer overflow vulnerability triggered by a maliciously crafted PWD response from an FTP server. When the client connects to a server and receives an overly long directory string in response to the PWD command, the client fails to properly validate the length of the input before copying it into a fixed-size buffer. This results in memory corruption and allows remote attackers to execute arbitrary code on the client system.
Title Xftp FTP Client <= 3.0 PWD Response Buffer Overflow
Weaknesses CWE-121
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-21T20:16:17.595Z

Updated: 2025-08-21T20:28:52.429Z

Reserved: 2025-08-20T20:33:55.844Z

Link: CVE-2010-20122

cve-icon Vulnrichment

Updated: 2025-08-21T20:28:49.148Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-21T21:15:34.680

Modified: 2025-08-22T18:08:51.663

Link: CVE-2010-20122

cve-icon Redhat

No data.